Article Details
Retrieved on: 2018-04-15 22:26:15
Tags for this article:
Click the tags to see associated articles and topics
Excerpt
<div>Tasks will include the processing and storing of packet capture (PCAP), development of cyber <b>analytics</b> to identify suspicious and anomalous activity, <b>big</b> <b>data</b> cyber hunting, data acquisition and enhancement of the BDP tool suite. Additionally, EITC technical experts will conduct user testing activities ...</div>
Article found on:
This article is found inside other hiswai user's workspaces. To start your own collection, sign up for free.
Sign UpAlready have an account? Log in here